Logging In With A USB Key (U2F Explained) by Techquickie www.youtube.com VIDEO
Change your Facebook password now! By Paul Ducklin, nakedsecurity.sophos.com
Facebook has just admitted that it has found many places – hundreds of millions of places, maybe – where it saved users’ passwords to disk in raw, unencrypted form.
Google Password Manager: 7 Things You Must Know By Dan Price, www.makeuseof.com
A password manager is the perfect way to create secure, unique passwords that can be controlled centrally. Google Chrome has one built-in, potentially saving you the need for third-party software.
Privacy.com Review By Ash The Great, echeck.org
When you pay for something online, you are putting your financial and personal details at risk. No matter which form of payment you use, there is always a risk, and there is no way for you (the consumer) to know just how big or small the risk is. The sheer number of massive hacks and leaks over the last ten years is proof enough that we have no idea how safe our payment information really is. Privacy.com adds another layer of privacy. Every time you use your credit card, it generates a brand new set of details, and you use the new details to pay instead of your real payment details. It is like paying with a disposable credit card. Privacy.com allows you to generate new payment details that you can use to buy things online, and they call it, “Creating a virtual credit card.”
Google Smart Lock: The complete guide By Jr Raphael, www.computerworld.com
Think fast: How many times a day do you pick up your phone to look at something? Unless you live in the tundra or have far more self-control than most, the answer probably falls somewhere between "quite a few" and "more than any sane person could count." Assuming you keep your device properly secured, that means you're doing an awful lot of unlocking — be it with your face, your fingerprint, or the code you tap or swipe onto your screen.
10 Important Android Settings You Should Know! By Thiojoe, youtube.com VIDEO
Android is an extremely popular mobile OS, and I actually think most of you use it. So here are some important settings that you should know about if you don't already. They aren't hidden settings, so don't be surprised if you do know some. They aren't settings you should necessarily change, because most of these come down to preference.
13 Android Settings You Should Change Now! by ThioJoe youtube.com VIDEO
Those default settings are no good! Here's what to change… — Android has a lot of default settings that might be OK for most people, but there are some that really everyone should change. These might be settings related to privacy, security, or just plain convenience.
Firefox Send, Free File Transfers and Sharing with End to End Encryption.
Firefox Send uses end-to-end encryption to keep your files secure from the moment you share to the moment it's opened. You choose when your file link expires, the number of downloads and the option to add a password to protect the contents further.
Firefox Send also makes it easy to share large file sizes. You can share file sizes up to 1GB without a login. To send files up to 2.5GB, login to your Firefox account, if you don't have a Firefox account signup is free.
Firefox Send makes it easy for your recipient. They click the link you sent to download the file. They don’t need to have a Firefox account to download your file. Making the file sharing experience seamless for both parties, as quick as sending an email.
Here's the link to Firefox Send, save as a bookmark.
Note: This is a great tool for sharing event pictures and videos with other attendees. Simply upload your images, send everyone the link, as many as 100 people will have 7 days to download them.
How to Manage Saved Passwords in Chrome By Brady Gavin, www.howtogeek.com
Google Chrome comes with a handy password manager already built in. You can have your browser save and fill out passwords for different sites when you’re asked to sign in. Here’s how to manage all your saved passwords in Chrome.
MyEquifax.com Bypasses Credit Freeze PIN by krebsonsecurity.com
Most people who have frozen their credit files with Equifax have been issued a numeric Personal Identification Number (PIN) which is supposed to be required before a freeze can be lifted or thawed. Unfortunately, if you don’t already have an account at the credit bureau’s new myEquifax portal, it may be simple for identity thieves to lift an existing credit freeze at Equifax and bypass the PIN armed with little more than your, name, Social Security number and birthday.
How to make people sit up and use 2-factor auth: Show 'em a vid reusing a toothbrush to clean the toilet, then compare it to password reuse By Iain Thomson, www.theregister.co.uk
RSA Despite multi-factor authentication being on hand to protect online accounts and other logins from hijackings by miscreants for more than a decade now, people still aren't using it. Today, a pair of academics revealed potential reasons why there is limited uptake.
Your Authentication Options Explained | 2FA, MFA, and more By Leah Bachmann, blog.lastpass.com
Cybercriminals are skilled lock pickers. They know the best opportunities to break through security barriers. Their motivation is simple: transform digital data into hard cash.
Password Manager Showdown: LastPass vs. 1Password By Zapier, zapier.com
Until a better security standard is accepted by everyone, we're stuck using usernames and passwords.
Keep your money safe. https://privacy.com/
Privacy creates secure virtual cards and completes checkout forms for you, saving you time and money while masking your real card details.
Try Privacy, It's FREE *
How to use password manager apps and browser add-ons in 2019 By Tom Mcnamara, download.cnet.com
We've been telling folks for years that you need to use a password manager to really protect your bank accounts, credit cards, and other important data, in combination with app-based two-factor authentication. But while we've talked about the general importance of these critical personal data security tools and others, it's been a while since we explained how a password manager works.
You Probably Need a Reality Check on Cybersecurity By Angela Moscaritolo, www.pcmag.com
According to a new Google survey, most people are confident about their ability to protect their online accounts, yet many fail to take basic online security precautions such as regularly installing updates and using unique passwords.
5 Tips to Change your Password By Leah Bachmann, blog.lastpass.com
Even though weak, reused and compromised passwords are the cause behind many breaches, people continue to display pretty risky password behavior. In fact, we’ve found that 91% of people know that using the same password for multiple accounts is a security risk, but 59% admitted that they do it anyway.
You want your phone with you everywhere. Don’t you feel the same way about your passwords? With the LastPass iOS and Android apps you have access to all your passwords wherever you go.
Using LastPass on Android: Tricks you Might have Missed By Leah Bachmann, blog.lastpass.com
We carry our phones with us everywhere, so it’s important our favorite apps are available on-the-go. LastPass offers a great app for both Android and iOS users that lets you access all your passwords and other essential information wherever you need it.
Password Fatigue and LastPass By Joe Siegrist, blog.lastpass.com
John Kelly of the Washington Post had an amusing article today about how much trouble it is to create a new password every 90 days: So Many Passwords, So Little Time By John Kelly
The Tech Guy airs every weekend in over 170 cities in the US and Canada and on America’s Talk XM Channel 244
Watch Mara from Los Angeles, CA
Mara was a victim of identity theft, and just narrowly avoided having her brokerage account drained. Leo says that Mara should change her password and turn on 2 factor authentication right away. Leo suspects the bad guys got her information from a database breach like the Collection #1 or the Marriott hack. Leo also suggests going to haveIbeenpwned.com/passwords and see if her passwords have been compromised and are known. Leo also recommends having a credit freeze put on Mara's account using Equifax, Experian, and TransUnion. That will prevent any additional credit accounts being opened in her name.
Here's the One Gmail Setting You Should Activate Now By Marshall Honorof, www.tomsguide.com
Gmail has more than one billion users, and there's a very good chance that you're among them. With Google Photos, Google Drive, Google Docs and a myriad of other productivity services, Google's popularity and reach are nearly unparalleled, particularly if you also use the company's Android operating system on your mobile device.
Here’s the worst mistake people make that compromises their online security By Kari Paul, www.marketwatch.com
Amazon AMZN, +2.20% founder and Chief Executive Jeff Bezos accused the National Enquirer of politically motivated blackmail late Thursday, and published a threatening email from an executive at the supermarket tabloid’s parent company. One of the many lessons from that controversy is don’t take photos that might compromise your privacy and, if you do, don’t send them via text message or email to another party. Many people would refrain from doing so.
Forgot password? Five reasons why you need a password manager By Ed Bott, www.zdnet.com
For years, I've been reading predictions about new technologies that will render passwords obsolete. Then I click through and inspect the details and I wind up shaking my head. There are plenty of clever identity technologies working their way into the mainstream, but passwords will remain a necessary evil for many years to come.
Google’s New Chrome Extension Alerts You If Your Passwords Have Been Leaked By Cameron Summerson, www.howtogeek.com
We’ve reached a point where new data breaches are announced on what seems like a weekly basis. It’s almost impossible to keep up with all the breaches and your password situation, but a new Chrome extension from Google is here to help.
Chrome’s hidden lookalike detection feature battles URL imposters By Danny Bradbury, nakedsecurity.sophos.com
Most of us have suffered from fat-fingered browsing before, mistyping website URLs and getting taken to the wrong place. Some of us have fallen victim to hyperlinks that look like legitimate websites at first glance but which are deliberately misspelled. Now, Chrome will try to save us from lookalike sites by detecting them and flagging up a warning.
Why It’s Dangerous to Share Your Birthday Online By Anthony Heddings, www.howtogeek.com
A birthday isn’t something you might think of as being private information you should keep secret. Almost everyone celebrates them on social media, and quite a few people post them on their profile. That’s a horrible idea; here’s why.
8 Easy Ways to Supercharge Your LastPass Security By Dan Price, www.makeuseof.com
By now, you should know the basic principles of keeping your online accounts secure Have You Taken These 5 First Steps to Secure Your Accounts Online? Have You Taken These 5 First Steps to Secure Your Accounts Online?
7 Password Manager Features You Need to Know About By Shubham Agarwal, www.makeuseof.com
Password managers are an essential tool in your digital arsenal. One of the reasons they’ve become so common is because of how straightforward they are to understand and operate. They manage your long passwords so that you don’t have to remember them.
LastPass: Password security for your family in 2018 by dottotech VIDEO
Improve your online security and save time with LastPass, the password manager that remembers all your passwords so you don't have to.
LastPass FULL TUTORIAL Password Manager By David A. Cox, www.youtube.com VIDEO
The Best Password Managers, Compared by censiCLICK
This video gives an overview of the most popular password managers of 2018. Most are cross-platform from Windows, macOS and Linux to iOS and Android. Keep your online accounts secure by using a password manager!
Two-factor authentication: Why do I need it? What are the best apps? – By Bradley Chambers, 9to5mac.com
Security on the internet has become more important with each passing year. It seems like every other month there is a major data breach from major retailers or online properties. One of the key things that you can do to minimize the effect these breaches will have on you is to set up and use two-factor (or multi-factor) authentication.
How to Remove Your Windows Password – By Brady Gavin, www.howtogeek.com
Not everyone likes having to enter a password every time they need to sign in to their computer. Windows lets you get rid of the password without too much hassle.
Voicemail Phishing Campaign Tricks You Into Verifying Password – By Lawrence Abrams, www.bleepingcomputer.com
A new phishing campaign is underway that utilizes EML attachments that pretend to be a received voicemail and prompts you to login to retrieve it. This campaign also uses a clever tactic of tricking you into entering your password twice in order to confirm that you are providing the correct account credentials.
Want to Stay Safe Online? Use Two-Factor Authentication. Here's How – By Patrick Lucas Austin, time.com
The massive and numerous data breaches over the last few years prove at least one thing: Passwords alone can’t protect you. And as if to remind you that 2019 will be just as fraught with cybersecurity issues as the year before, security researcher Troy Hunt discovered yet another major breach, ominously titled “Collection #1,” in which nearly 773 million email addresses and 21 million passwords were exposed.
Can You Pass Google's Phishing Quiz? – By Victoria Song, gizmodo.com
Phishing is clearly bad, but it’s not always easy to suss out a sketchy email from a legitimate one. To help, Alphabet subsidiary Jigsaw has made a quiz with Google to teach people how to better spot malicious emails.
Serious Security: What 2000 years of cryptography can teach us – By Paul Ducklin, nakedsecurity.sophos.com
These days, a lot of your data gets encrypted when you save it to disk or send it over the internet.
The data gets decrypted again when you read it back in or after it’s received at the other end.
It’s Time to Audit All the Extensions You've Installed on Your Browser – By David Nield, gizmodo.com
A lot of what we do on our computers goes through the browser, and that means any extensions you choose to add on top of that browser have a very privileged position: They can see where you’re going online, they can see the data you’re passing to and from the web, and they can send and receive data themselves.
Can Anyone Really Track My Phone’s Precise Location? – By Chris Hoffman, www.howtogeek.com
Lewis Tse Pui Lung/Shutterstock.com.Photo by: Lewis Tse Pui Lung/Shutterstock.com
It’s the year 2019, and everyone willingly carries a tracking device in their pockets. People can have their precise locations tracked in real time by the government, advertising companies, and even rogue bounty hunters. It sounds like dystopian fiction—but it’s a reality.
Over 1 Billion Login Credentials Leaked, Here’s How to See if You Were Compromised – By Cameron Summerson, www.howtogeek.com
Maxim Apryatin/Shutterstock.comPhoto by: Maxim Apryatin/Shutterstock.com
Good morning! A whole slew of usernames and plaintext passwords were leaked for a number of different sites—at 772 million and 21 million respectively, it’s the largest data leak in history. Here’s how to make sure your information is still safe.
The 15-minute Chromebook tune-up – By Jr Raphael, www.computerworld.com
As far as computers go, Chromebooks are almost shockingly low-maintenance. Google's Chrome OS operating system updates itself silently and automatically — as do most of the core apps associated with the platform — and it doesn't get gunked up and slowed down over time, as traditional operating systems tend to do. There's no antivirus software to fret over, either, and little in the way of complicated settings or compatibility concerns.
New Flag Enables Powerful Feature For Chromebook Files App – By Robby Payne, chromeunboxed.com
If you are a user who’s made the transition to Chromebooks from a more standard OS like Mac OS or Windows, file management could be a little different for you.
9 Most Useful Chrome Browser Extensions – By Natasha Stokes, www.techlicious.com
Using Chrome? One of the greatest features of Google’s nimble, speedy browser is the sheer volume of free extensions available from the Chrome store. These extensions are essentially software add-ons that enhance the browser’s performance, tacking on extra capabilities to what you can do within its confines.
Want stronger passwords? Understand these 4 common password security myths – By Fahmida Y. Rashid, www.csoonline.com
Talking about password security is a guaranteed crowd-snoozer, a surefire way to make people shut down and tune out, but the reality is that passwords are still important. Email or social media, online banking or gaming, educational applications or online services—anything that keeps some kind of user data still depends on passwords to keep miscreants out. Attackers will continue merrily looting bank accounts and taking over online services if users don’t step up and use better passwords.
Windows 7 Only Has One Year of Security Patches Left – By Chris Hoffman, www.howtogeek.com
Microsoft will stop supporting Windows 7 with security updates on January 14, 2020. It’s like Windows XP all over again—but much worse. Many more people are sticking with Windows 7 than stuck with XP.
YubiKey 5 NFC security key review – By Liz Rodriguez, the-gadgeteer.com
REVIEW – In a previous YubiKey review, I mentioned how we now live in a world where many websites are being compromised. Along with mobile authenticator apps available, using a hardware device such as the YubiKey is great for extra login security. I had the opportunity to take a look at the newest of Yubico’s hardware keys; the YubiKey 5 NFC. Let’s take a look!
It’s Time to Dispel These Dangerous Password Security Myths – By Mike Elgan, securityintelligence.com
These are exciting times for authentication technologies. We’ve only just begun to explore a new world beyond passwords. Emerging alternatives abound, from biometrics to multifactor authentication (MFA) to behavioral analysis and many other innovative ideas.
New Year’s resolutions: Get your passwords shipshape – By Tomáš Foltýn, www.welivesecurity.com
In case there are some blank entries in your laundry list of New Year’s resolutions, we have a few tips for a bit of cybersecurity ‘soul searching’. Here’s the first batch, looking at how you can fix your good ol’ passwords.
Google's Public DNS now works with Android 9 Pie – By Corbin Davenport, www.androidpolice.com
A Domain Name System, or DNS for short, is the component of your network connection that looks up the server IPs after you enter a domain name (e.g. androidpolice.com). Most people use the default DNS services from their ISPs/carriers, but alternatives have existed for years, like Google Public DNS. Google announced today that its DNS service finally supports DNS-over-TLS, meaning it can be set as the system-wide DNS provider on Android 9 Pie.
When you use Google Public DNS, you are changing your DNS "switchboard" operator from your ISP to Google Public DNS.
'You can't relax': Here's why 2-factor authentication may be hackable – By Jennifer Schlesinger | Andrea Day, www.cnbc.com
In a quest to make online accounts safer, many services now offer two-factor authentication. The system typically sends a code to a user's mobile phone that they need log in, along with a username and password.
Lock Down Your Tech in 2019 With These Resolutions – By Justin Pot, www.howtogeek.com
If you’re a human person who occasionally engages in commerce, hackers are probably targeting you. This year, resolve to do something about it.
You know you need to take better care of your personal information, but you keep putting it off.
How to Create a System Image Backup in Windows 7, 8, or 10 – By Walter Glenn, www.howtogeek.com
The built-in backup utilities in Windows are pretty solid. Let’s take a look at how to create a full backup image of your PC without the need for a third party utility.
You Should Freeze Your Child’s Credit. It’s Not Hard. Here’s How. – By Ron Lieber, www.nytimes.com
A new law requiring credit bureaus to offer you free freezes applies to children, too. It’s easier than you’d expect, but you may still have questions. Here are some answers.
A new Google Chrome attack can freeze your Windows 10 device – By Anmol, mspoweruser.com
A new exploit has been discovered in Google Chrome that can potentially freeze Windows 10 devices completely. The new bug is being used in a tech support scam that freezes Windows 10 and then tells the user that their device is infected by a virus.